2min chapter

RunAs Radio cover image

Incident Response Readiness with Paula Januszkiewicz

RunAs Radio

CHAPTER

How to Prevent a Hacker From Getting Into Your Network

We could find literally live hacker running the tools to extract information. It was very exciting. This is where I think that toolkit would be useful, right? If I'm able to point at a machine and say, this machine has unusual traffic, give them no further access to the rest of the network. Just one click. Right. To have that, have that button ready to go that I can lock that machine from getting access to other machines in my network but maybe not cut them off from the internet so that I can observe all the traffic. Exactly. So you isolate that machine, uh, in the way that you establish,. That's what you truly need within the incident. And

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode